1HACKING

Get ahead of the attackHave your own hacker

Do you want to improve the security of your website, application, or entire IT infrastructure? Do you need continuous security monitoring, or do you just want to test the vulnerabilities of your systems? You're in the right place.

CONTACT

Certifications

Expertise

Offensive Security Certified Expert 3

Offensive Security Certified Expert 3

The highest level of Offensive Security certification, which requires the acquisition of OSEP, OSED and OSWE certifications, demonstrating comprehensive knowledge in exploit development, web and enterprise attacks.

Offensive Security Experienced Penetration Tester

Offensive Security Experienced Penetration Tester

Advanced ethical hacker certification focusing on exploitation in real enterprise environments, AD attacks and post-exploitation techniques.

Offensive Security Exploitation Developer

Offensive Security Exploitation Developer

I am proficient in developing vulnerabilities and exploitation techniques.

Offensive Security Web Expert

Offensive Security Web Expert

As an advanced web application security expert, I am able to exploit and fix complex web vulnerabilities.

Offensive Security Certified Professional

Offensive Security Certified Professional

As a skilled ethical hacker, I can identify and exploit vulnerabilities in real environments.

CyberInstitute Certified Ethical Hacker

CyberInstitute Certified Ethical Hacker

As a security expert, I ethically test and secure systems against cyber threats.

Services

How we can help

Proposal

Proposal and Preliminary Assessment

This package is intended for clients who are unsure whether a security assessment is needed or which service best fits their environment. Its purpose is to support a precise and professional proposal.

Security Assessment and Proposal

1–2 business days

49,999 HUF

Includes
  • Review of technical environment and requirements
  • Identification of the appropriate service package
  • Professional consultation
  • The assessment fee is included in the selected service
Web & App

Web and Application Security Testing

This package focuses specifically on web and application security, ideal for small businesses, startups, and software developers using or developing web applications.

Web Application Vulnerability Testing

1-2 weeks

Includes
  • Discover hidden vulnerabilities (e.g. SQL Injection, XSS, CSRF)
  • Modern automated and manual testing methods
  • Detailed report with security recommendations
  • Tailored to medium-sized businesses' needs

Application Source Code Analysis

1-2 weeks

Includes
  • Comprehensive mapping of source code vulnerabilities
  • Analysis of code structure quality and cleanliness
  • Identification of logical errors, missing checks
  • Comprehensive security audit according to OWASP
  • Detailed, easy-to-understand guide for repair steps
Infra & Network

Infrastructure and Network Security Testing

This package focuses on comprehensive testing of network and internal IT infrastructure security. Recommended for medium to large enterprises with complex systems and multi-layered network devices.

Internal Network Security Testing

2 weeks

Includes
  • Security audit of network devices and configurations
  • Automated and manual network vulnerability testing
  • Permissions, network segmentation and access checks
  • Identification of critical flaws and shortcomings
  • Detailed report with security recommendations
  • Tailored for large enterprise environments and complex IT systems

Comprehensive Security Audit

1 month

Includes
  • Full vulnerability testing of web applications and internal networks
  • Continuous testing of internal and external network threats
  • Combination of automated and manual testing for maximum coverage
  • 1 month of support for planning and implementing repairs
  • Tailored proposals and development advice to meet unique needs